ch3-Ethics-20212-sec1

ch3-Ethics-20212-sec1

University

6 Qs

quiz-placeholder

Similar activities

Mobile Phone Virus Quiz

Mobile Phone Virus Quiz

University

10 Qs

Distributed_Systems_Quiz_One

Distributed_Systems_Quiz_One

University

11 Qs

Mobile Systems Quiz

Mobile Systems Quiz

University

10 Qs

BIM30603 Quiz 1

BIM30603 Quiz 1

University

10 Qs

Current IT Issues and Future Trends

Current IT Issues and Future Trends

University

10 Qs

IoT 3

IoT 3

University

10 Qs

Pre-Lecture Quiz (Topic 1)

Pre-Lecture Quiz (Topic 1)

University

10 Qs

Review MCC: Session 6-10

Review MCC: Session 6-10

University

10 Qs

ch3-Ethics-20212-sec1

ch3-Ethics-20212-sec1

Assessment

Quiz

Professional Development, Computers, Science

University

Medium

Created by

Duha Al Smadi

Used 2+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computer Incidents are So Prevalent because of advanced technologies such as cloud computing and virtualization.

True

False

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Businesses have moved quickly into e-commerce, mobile computing, and collaborative work groups. Thus, we need to (Select all that apply)

Perform an ongoing assessment of new security risks

Implementing approaches for dealing with risks

Abandon technologies

Use traditional technicques in bsuiness

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Bring your own device" refers to:

A technique that is developed to fight cybercrime

A business policy that permits employees to use their own mobile devices to access company computing resources

An approach of motiviating employees to buy smart devices

Non of them

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An ....................... is an attack on an information system that takes advantage of a particular system vulnerability

Virus

Exploit

Worm

Antivirus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

This photo represents a serious type of attack which is:

DDoS

DoS

Virus

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...................... is a program in which malicious code is hidden inside a seemingly harmless program

RootKit

DoS

Worm

Trojan Horse